Armoring Solaris

Firewalls are one of the fastest growing technical tools in the field of information
security. However, a firewall is only as secure as the operating system it resides
upon. This article will take a step by step look at how you can best armor your Solar
is box, both Sparc and x86. These steps can apply to any situation, however I will
be using Checkpoint Firewall 1 on Solaris 2.6 as an example. At the end of this
article is a script that you can download that will automate most of the armoring
process, to include implementing TCP Wrappers.
Firewalls are one of the fastest growing technical tools in the field of information
security. However, a firewall is only as secure as the operating system it resides
upon. This article will take a step by step look at how you can best armor your Solar
is box, both Sparc and x86. These steps can apply to any situation, however I will
be using Checkpoint Firewall 1 on Solaris 2.6 as an example. At the end of this
article is a script that you can download that will automate most of the armoring
process, to include implementing TCP Wrappers.